


Perceptive Security
SOC/SIEM Consultancy

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into mo…
Published:
2 April 2026 at 22:00:00
Alert date:
3 April 2026 at 17:05:03
Source:
nvd.nist.gov
Security Tools, Supply Chain & Dependencies
Command injection vulnerability in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. The vulnerability exists in the console.run_module_with_output() function and breaks intended command structure. This causes the Metasploit console to execute additional unintended commands. The flaw can lead to arbitrary command execution and manipulation of Metasploit sessions. Attackers can exploit this by injecting malicious commands through module parameters.
Technical details
Mitigation steps:
Affected products:
pymetasploit3
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-5463
https://github.com/DanMcInerney/pymetasploit3
https://pypi.org/project/pymetasploit3/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
